Instruction manual
Keeping unauthorized third parties from entering the
system
Issue 9 May 2003
5-9
For DEFINITY G2 and System 85, authorization codes can replace barrier codes
on incoming remote access facilities or can be used to screen outgoing calls on
AAR/ARS/WCR trunks. Only authorization codes with the Network Access Flag
set are permitted to make outgoing calls.
The authorization code option requires that the caller enter a valid authorization
code to receive switch dial tone. The authorization code used for remote access
has an FRL value used by AAR/ARS/WCR trunks for outgoing calls [see ‘‘Facility
restriction level’’ on page 5-19]. Up to 5,000 authorization codes can be issued to
System 75 R1V3 and DEFINITY G1 users, and up to 90,000 for System 85,
DEFINITY G2, and G3 users. However, it is best to keep the number of authorized
users to a minimum.
To maximize the security of the system, follow these steps:
■ When assigning authorization codes, give the users the lowest possible
FRL needed for their calling requirements.
■ Be sure to remove any unused authorization codes from the system,
including those assigned to employees who have changed assignments or
left the company.
■ Assign each authorization code the minimum level of calling permissions
required.
■ Make authorization codes nonconsecutive (random).
■ Administer each authorization code to the maximum length allowed by the
system (7 digits).
NOTE:
When a call directed to a VDN points to a vector containing a Route To step,
and that Route To step attempts to utilize an authorization code, the call will
be denied.
Feature access code administration
Certain feature access codes may facilitate egress from the system and should be
used with care. These include: Data Origination, Data Privacy, Data Restriction,
Abbreviated Dialing, ARS/AAR, Call Forwarding, and Facility Test Calls.
Trunk administration
When trunk groups are administered, they are assigned a Trunk Access Code
(TAC). Unless they are needed, prohibit both direct-dial access and facility test
call access to trunk groups. This prevents callers from using TACs to obtain an
outgoing trunk.